Updated: 2024-10-04
CWE: NVD-CWE-noinfo
Description:
In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a 'short' clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.
CVSS3: 5.5
OS | Vendor version | Errata |
---|---|---|
Ubuntu 20.04 | 5.4.0-200.220 | USN-7088-1 |
Oracle Linux 7 UEK 6 | 5.4.17-2136.336.5.1.el7uek | ELSA-2024-12780 |
Oracle Linux 8 UEK 6 | 5.4.17-2136.336.5.1.el8uek | ELSA-2024-12780 |
Ubuntu 20.04 AWS | 5.4.0-1135.145 | USN-7088-4 |
Debian 11 | 5.10.226-1 | DLA-3912-1 |
Ubuntu 22.04 | 5.15.0-125.135 | USN-7100-1 |
Debian 11 cloud | 5.10.226-1 | DLA-3912-1 |
Ubuntu 20.04 HWE AWS | 5.15.0-1072.78~20.04.1 | USN-7100-1 |
Ubuntu 20.04 GCP | 5.4.0-1139.148 | USN-7088-1 |
OS | Original kernel version | State |
---|---|---|
Ubuntu 18.04 HWE Focal | |
Planned |
Ubuntu 20.04 | |
Planned |
Oracle Linux 7 UEK 6 | |
Ready For Release |
Oracle Linux 8 UEK 6 | |
Ready For Release |
Ubuntu 20.04 AWS | |
Planned |
Debian 11 | |
Planned |
Ubuntu 22.04 | |
Planned |
Debian 11 cloud | |
Planned |
Ubuntu 20.04 HWE AWS | |
Planned |
Ubuntu 20.04 GCP | |
Planned |